The Iraqi Journal for Computer Science and Mathematics, established in 2020, is a distinguished, peer-reviewed open-access publication issued four times a year by the College of Education at Aliraqia University. Dedicated to advancing the frontiers of computer science, mathematics, computer engineering, and statistics, the journal provides a platform for researchers to share their groundbreaking work with a global audience.
By emphasizing rigorous single-blind peer review and rapid publication within an average of two months, it ensures timely dissemination of innovative research findings. The journal's commitment to full open access removes financial barriers, making knowledge accessible to a wider scholarly community. Aligning with Aliraqia University's mission, it contributes to the development of a robust scientific landscape in Iraq and beyond. The journal accepts various types of articles, including original research, review articles, and editorial papers, and is indexed in Scopus, DOAJ, and Iraqi academic journals. Iraqi Journal for Computer Science and Mathematics.
See the Aims and Scope for a complete coverage of the journal.
Current Issue: Volume 5, Issue 4 (2024)
Original Studies
Posinormality of Operators Treated by Weyl's Theorem on Unbounded Hilbert Space
Abbas G. Rajij, Dalia S. Ali, Huseyin Cakalli, and Nadia M. G. Al-Saidi
Automated Fake News Detection System
Saja A. Al-obaidi and Tuba Çağlıkantar
Robust Image Watermarking Based on IWT-DCT-SVD for Copyright Protection
Syafiqul Shubuh, Ferda Ernawan, Agit Amrullah, and Prajanto Wahyu
Image Watermarking using Firefly Algorithm–IWT-SVD for Copyright Protection
Anjahul Khuluq, Ferda Ernawan, Agit Amrullah, and Mohd Arfian Ismail
Robust Image Watermarking Based on Schur Decomposition
Ahmad Toha, Ferda Ernawan, and Agit Amrullah
Modelling Security Factors Influencing E-Wallet Adoption in Malaysia
Adi Badiozaman Ruhani, Nur Suhaili Mansor, Hapini Awang, Mohamad Fadli Zolkipli, Khuzairi Mohd Zaini, and Abderrahmane Benlahcene
Robust-Fragile Watermarking Using Integer Wavelet Transform for Tampered Detection and Copyright Protection
Hendra Budi, Ferda Ernawan, and Agit Amrullah
Embedded Schemes of the Runge-Kutta Type for the Direct Solution of Fourth-Order Ordinary Differential Equations
F. A. Fawzi and Nizam G. Ghawadri
A Comprehensive Analysis of Partition Dimensions in Efavirenz Abacavir Lamivudine Doravirine of Anti-HIV Drug Structures
R. Nithya Raj, R. Sundara Rajan, and Hijaz Ahmad
Stable Heterogeneous Traffic Flow with Effective Localization and Path Planning in Wireless Network Connected and Automated Vehicles in~Internet of Vehicular Things (IoVT)
Ahmed N. Rashid and Ahmed Mahdi Jubair
Explainable Machine Learning Approach enables Computer-Aided Identification System for Children Autism Spectrum Disorder (C-ASD)
Karrar Hameed Abdulkareem, Zainab Hussein Arif, and Mazin Abed Mohammed
Investigating Intrusion Detection System Using Federated Learning for IoT Security Challenges
Mohammed Q. Mohammed, Zena Abd Alrahman, and Aouf R. Shehab
New Three-Parameter Exponentiated Benini Distribution: Properties and Applications
Elif Yıldırım, Gamze Özel, Christophe Chesneaul, Farrukh Jamal, and Ahmed M. Gemeay
Convolutional Neural Networks for Dementia Severity Classification: Ordinal Versus Regular Methods
Ambresh Bhadrashetty and P. Sandhya
Secure Blind Medical Image Watermarking Using Hybrid Feature Extraction Techniques
Sawsan D. Mahmood, Yassine Aribi, Fadoua Drira, and Adel M. Alimi
The Significance of Cannibalism, Panic, and Sanctuary in the Interactions Between Prey and Predator with a Stage Structure
Ahmed Sami Abdulghafour and Raid Kamel Naji
E-Learning Management Technology Integration for Laboratory Usage
Mohammed Khaleel Hussein, Mohammed Ahmed Subhi, Saleh Mahdi Mohammed, and Mayasah Al-khateeb
Energy Optimization in Wireless Sensor Networks: A Review
Zahraa Hammodi, Ahmed Al Hilli, and Mohanad Al-Ibadi
Unveiling The Shadows: The Influence of Anonymity and Fake Accounts on Cyberbully Intention in Social Media
Muzdalini Malik, Hapini Awang, Nur Suhaili Mansor, Mohamad Fadli Zolkipli, Khuzairi Mohd Zaini, and Abdulrazak F. Shahatha Al-Mashhadani
Develop Secure Software specifications for Android App concealing the Information and Safeguarding Data
Huda Abdulaali Abdulbaqi, Ahmmad Mohamad Ghandour, and Thekrayat Abbas Jawad